Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
661
Finite volume central schemes for three-dimensional ideal MHD
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
662
Systematic reviews in sentiment analysis: a tertiary study
Published 2022“…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
-
663
Precision nutrition: A systematic literature review
Published 2021“…Four machine learning tasks are seen in the form of regression, classification, recommendation and clustering, with most of these utilizing a supervised approach. In total, 30 algorithms were used, with 19 appearing more than once. …”
-
664
Central schemes for ideal magnetohydrodynamics
Published 2007Get full text
Get full text
Get full text
Get full text
conferenceObject -
665
Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain
Published 2025“…<p dir="ltr">This research presents an ensemble Reinforcement Learning (RL) approach that combines Deep Q-Network (DQN) and Proximal Policy Optimization (PPO) algorithms to tackle quantum control problems. This research aims to use the complementary strengths of DQN and PPO algorithms to develop robust and adaptive control policies for noisy and uncertain quantum systems. …”
-
666
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
Get full text
Get full text
Get full text
article -
667
An aspect-oriented framework for systematic security hardening of software
Published 2008“…In this thesis, we address the problems related to the security hardening of open source software. …”
Get full text
Get full text
Get full text
masterThesis -
668
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
-
669
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. This app uses key stroke-related timelines including the last time the patient was known to be well, patient location, treatment options, and imaging availability at different health care facilities.…”
-
670
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
-
671
A new method for broad‐scale modeling and projection of plant assemblages under climatic, biotic, and environmental cofiltering
Published 2023“…To this purpose, we first used multilabel algorithms in order to convert the task of explaining a large assemblage of plant communities into a classification framework able to capture with high cross-validated accuracy the pattern of species distributions under a composite set of biotic and abiotic factors. …”